Abstract:
The disclosed technology relates a system is configured to generate a protected configuration for a network device based on network connectivity data for a plurality of devices in a managed network associated with a cloud management system. The system is further configured to receive a configuration change for the managed network, determine that the configuration change is incompatible with the protected configuration, and generate a notification that the configuration change is incompatible with the protected configuration.
Abstract:
The present technology is directed to an automated end to end network migration process from on-premise to cloud-based management platforms and visa-versa. The disclosed technology describes an enhanced plug and play (PnP) software agent operationally coupled to a device and capable of interacting with a PnP service hosted on a target management platform to thereby initiate the migration process. The PnP service on the target management platform upon receiving a migration request from the device PnP agent, maps the requesting device onto a client profile existing on the target management platform and identifies therefrom the associated default controller for the device. Subsequently, the device is directed to acquire and boot up on a new software image compatible with the target management platform and following a conversion of its existing configuration into a version compatible with the new software image, the device is migrated to the associated default controller.
Abstract:
Embodiments include receiving one or more packets of a Wi-Fi calling session via a secure tunnel from a user device, where the user device is connected to a source network via a Wi-Fi access point. Embodiments also include determining whether the Wi-Fi calling session is a threat based, at least in part, on identifying an anomaly of at least one packet of the one or more packets. An action can be taken if the Wi-Fi calling communication is determined to be a threat. More specific embodiments include determining the at least one packet is associated with the Wi-Fi calling session by correlating information in the packet with control plane data of the Wi-Fi calling session. Further embodiments can include intercepting the one or more packets in a second secure tunnel established between an evolved packet data gateway and a service provider network associated with the user device.
Abstract:
An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel.
Abstract:
A method is provided in one example and includes determining that at least one performance characteristic of a broadband communication channel between an access point and a gateway and managing access point communication channel utilization based, at least in part, on the performance characteristic. In one or more example embodiments, the access point communication channel utilization pertains to the broadband communication channel, at least one user equipment communication channel, and/or the like.
Abstract:
Techniques and systems described herein relate to shared storage systems across network devices to use unused storage space and provide backup and additional storage for devices as needed. The techniques and systems include determining availability data describing available storage locations and amounts on network devices, compiling such data at a network controller, and communicating the availability data to the network devices. The network devices then directly communicate with each other to store data remotely as needed.
Abstract:
In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.
Abstract:
Systems and methods provide for generating traffic class-specific congestion signatures and other machine learning models for improving network performance. In some embodiments, a network controller can receive historical traffic data captured by a plurality of network devices within a first period of time that the network devices apply one or more traffic shaping policies for a predetermined traffic class and a predetermined congestion state. The controller can generate training data sets including flows of the historical traffic data labeled as corresponding to the predetermined traffic class and predetermined congestion state. The controller can generate, based on the training data sets, traffic class-specific congestion signatures that receive input traffic data determined to correspond to the predetermined traffic class and output an indication whether the input traffic data corresponds to the predetermined congestion state. The controller can adjust, based on the congestion signatures, traffic shaping operations of the plurality of network devices.
Abstract:
Techniques for improved wireless ranging are provided. A first communication from a first client device is received at a first network device. A predefined minimum distance is determined for the first access point, where the predefined minimum distance corresponds to a distance at which the vertical location of the first network device causes time of flight ranging techniques to result in inaccurate location estimations. A first distance of the first client device from the first network device is estimated. Upon determining that the first distance of the first client device is below the predefined minimum distance, ToF ranging requests from the first client device are declined.
Abstract:
In one embodiment, a gateway to a zero trust network applies an access control policy to an endpoint device attempting to access a cloud-based application hosted by the zero trust network. The gateway acts as a reverse proxy between the endpoint device and the cloud-based application, based on the access control policy applied to the endpoint device. The gateway captures telemetry data regarding application traffic reverse proxied by the gateway between the endpoint device and the cloud-based application. The gateway detects an anomalous behavior of the application traffic by comparing the captured telemetry data to a machine learning-based behavioral model for the application. The gateway initiates a mitigation action for the detected anomalous behavior of the application traffic.